Thursday, September 14, 2006

DisablePagingExecutive Boost Windows Performance

Tweaking Windows core performance by editing registry key called DisablePagingExecutive only if

  1. plenty of memory installed, e.g. 1 GB RAM or more
  2. most of the memory being unused or idle on most of the time (wasting resource!), and
  3. Windows 2000 and above (Windows XP, Windows 2003) is running.
DisablePagingExecutive is a DWORD data type that could be located at registry path

HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management

The initial setup of Windows XP default DisablePagingExecutive value to zero. Setting this value to 1 to enable Windows core to fully utilize the huge memory installed. Tweaking this registry key benefits driver debugging too as all of the code and data are always memory resident. It also improves Windows system core performance by preventing high frequency of disk read in order to get code and data out from hard disk to memory for processing!

Related information:
  • Search more related info with Google Search engine built-in

Wednesday, September 13, 2006

Find And Remove Duplicate File

When the hard disk space going larger and larger, more files are storing into it. Over the time, there might be a lot of duplicate files scatter around the file system.

As bulk of these redundant files are here and there, redundant files mess up file system, decrease system performance, wasting valuable disk spaces, and ineffective file backup. It takes time and could be a really tedious job to find and delete these redundant files when low disk space alarmed!

MD5 checksum could be a good candidate to find duplicate and redundant files! It could be used to precisely identify which files have updated since last backup done by comparing the MD5 checksum of files between source and target of the backup.

MD5 short for Message-Digest algorithm 5, is a widely-used cryptographic hash function with a 128-bit hash value. MD5 has been employed in a wide variety of security applications used to check the integrity of data stream, TCP/IP packets, files, etc.
Related information:

  • MD5Sums is a tiny Windows command line freeware that able to automatically generate MD5 checksum for all files in a directory except sub directories. Technically, a Windows shell scripts such as VBScripts could be written to programmatic find duplicate files that reside in the file system by calling this tiny freeware via Run method of WshShell object.
  • MD5 unofficial homepage to find implementations in various programming languages.
  • MD5 shell scripts to find unique and redundant files in given directory
  • Search more related info with Google Search engine built-in

Tuesday, September 12, 2006

Unzip RAR With ExtractNow Freeware

ExtractNow is a great non-adware freeware used to decompress RAR compression file format!

As its name suggests, ExtractNow is merely an decompressing utility and is not a complete archival software. Nevertheless, this simple free utility is more than enough to satisfy today most decompressing functions. Other than supporting RAR compression file format, ExtractNow also support today majority compression file format such as ZIP, ISO, BIN, IMG, IMA, IMZ, 7Z, ACE, JAR, GZ, LZH, LHA, and SIT!

ExtractNow developer suggest not to bundle DLL that used to enable SIT compression file format support in its installer so as to reduce (installer) file size. Having say that, separate download of DLL is needed if expected to enable SIT support in ExtractNow.
Related information:
  • ExtractNow official site
  • Click here to separate download DLL to enable SIT file compression support
  • Search more related info with Google Search engine built-in

Sunday, September 10, 2006

Sharing Big File With File Splitter

Email a big file of few megabytes as attachment is never a good idea as it will likely to hang up the email server. Because of that, most email servers are likely configured to not relay or process email with non friendly attachment too. If it is really need to email such attachment,

  • Split the file into pieces of smaller size with file splitter such as File Chopper.
  • Compress the file to highest possible compression ratio and creating span disk (support by most zip utilities such as WinRar & Power Archiver)
  • Upload the file to public file server such as upload.com and rapidshare.de that offers file sharing services.
    CAUTION! It is better to zip the files with strong encryption before uploading to any public file sharing providers. Zip the files with encryption helps to reduce file size as well as protect sensitive data from the eyes of non expected readers!
  • Combination of the three method - split the file, compress it with password encryption, and host the split-compressed file to public file server.

    File splitter is preferable than span disk feature of zip utilities as file split could be rejoined with Windows built-in command whereas "span disk" require the receiving end to have similar zip program installed.
Related information:
  • File Chopper is a tiny file splitter program that able to chop a file into arbitrary file size and automatically generate a MS-DOS batch file used to rejoin the pieces of file back to its original file. The batch file is using Windows built in DOS copy command to do the job. For example, typing
    copy /b File.1 + File.2 WholeFile.exe
    to rejoin split files called File.1 and File.2 back to its original and workable file called WholeFile.exe
  • Uploading.com only allow unlimited download at certain countries or registered users only. Downloading speed is quite fast as at time of writing.
  • Rapidshare.de works similar to uploading.com
  • Using Lycos Mail account. The redesign of Lycos Mail upgraded to allow unlimited attachment size as claimed in its official site, provided not exceeding the default 3GB email storage space allocated to each email account. Although, the recipient's email system might not accepting such emails with huge attachment size. So, use Lycos Mail to send email with unlimited attachment size only to recipient's Lycos Mail email account! Perhaps, this is the Lycos Mail's intention to get more users to attach with Lycos Mail and not the others like Yahoo! Mail or Gmail!
  • Search more related info with Google Search engine built-in

Using VNC And Redhat Linux

VNC shorts for Virtual Network Computing which is based on Remote Frame Buffer (RFB) protocol. VNC enable any VNC compatible clients running on any platform to access remotely, in graphical mode, to any VNC compatible server running on any platform!

For example, a VNC client running on Windows XP able to remote access to the Redhat Linux X windows via VNC daemon running on Redhat Linux, or the Redhat Linux VNC client able to access to Windows XP and run the Windows program in Windows XP via the VNC session.

The term daemon is normally refers to Linux/Unix-based server application/process. So as here. And the term "server" is then refers to a Windows-based server application/process.
VNC provides not only GUI remote access but also persistent desktop where the long running program or unfinished editing works could be kept running while VNC session is closed. User could reconnect back later at some other places and straight away continue to work on the incomplete tasks.

However, there is a different in handling convention VNC session between Linux to Windows and Windows to Linux. When access from Linux VNC client to Windows VNC server, the screen seen in Linux VNC client is the same as one see in front of the real physical GUI console. When a Windows VNC client connects to Linux VNC daemon such as VNC Server, the screen seen in Windows VNC client is different from the real physical GUI console. This happens because the Linux X windows use the default :0 display (X server screen number) on startup and the port is not sharable with other sessions. The work around is by using x11vnc or the Redhat bundled Vino as VNC daemon.

Vino allow legacy VNC client access directly to the :0 display. For example, Redhat Enterprise Linux ES 4 comes with vino RPM package. Once installed, the Vino is called Remote Desktop and normally grouped under Preference menu. Its simple GUI configuration make it easier to startup the Vino's VNC daemon!

VNC Server is bundled with all Redhat Linux distribution. Once installed, start the VNC Server by typing vncserver at command prompt. The vncserver command, is actually a shell scripts file, bring up the first VNC Server daemon listening to TCP port 5801 & 5901 by default. To bring up second VNC Server daemon, specify a port number other than the default. For example, type vncserver :2 to bring second daemon listening to TCP port 5802 & 5902. Port number starting from 5801 is meant for Java-enabled web browser connection, while port number starting from 5901 is meant for legacy VNC client connection. Although VNC Server could not directly connecting to :0 display by default as Vino or x11vnc do, this feature could be enabled by using VNC loadable module for the X Window system or upgrade to VNC Server version 4.x.

x11vnc works like Vino but has much more features bundled such as built-in SSL encryption/authentication, file transfer, etc. x11vnc is written in plain C language and uses only standard libraries. So, there is no compatibility and performance issues by using x11vnc as VNC daemon, indeed!

Connecting from VNC client of any platform to Windows VNC server is quite straightforward. Just type the IP address of the Windows VNC server in VNC client will do. However, a combination of IP address and display port is used to connecting VNC client of any platform to Linux VNC daemon. The display port number is taken from the last 2 digits of Linux VNC daemon listening port number (ignore leading zero if any). For example, type http://10.170.46.111:5801 at any Java-enable web browser in order to connect to a Linux VNC daemon that listening to port 5801 or type 10.170.46.8:1 at any legacy VNC client in order to connect to Linux VNC daemon listening to port 5901.

Related information:

What Happen When Deleting A File

What happen to a file when deleting it from Windows? The native Windows OS delete function simply remove the file entry (complete path and filename) from directory entries. The file's data content, however, is still remain untouched in the storage area. That is why to copy a file of few hundred megabytes take some minutes while deleting it takes just few seconds.

Disk formatting isn't different. Unless low level format or Zero Fill is performed, an advanced undelete utilities able to recover data from a hard drive formatted with high level or native disk format utilities. With low level format, the entire hard disk is then filled with "zero", hence overwrite any data reside in the hard disk!

Note, it is better to use low format utilities from the respective hard disk manufacturer instead of generic low formatter (such as the BIOS built-in function) to avoid the hard disk unusable later!
Related information:
  • How to undelete a file from Windows
  • How to delete a sensitive file securely
  • SDelete command line utility used to delete sensitive data securely
  • Sure Delete Window GUI utility used to delete sensitive data securely
  • Create File - Windows 2000 Resource kit used to generate empty file of arbitrary size up to 4GB (when running on Windows XP)
  • WipeFree command line utility used to generate dump file to fill up free disk space where the deleted file reside
  • Search more related info with Google Search engine built-in

Zero Fill Sure Delete Sensitive Data

Simply delete a file or format a hard disk by conventional way doesn't securely protect sensitive data stored inside the hard disk!

There are chances that other people able to recover or undelete the sensitive data by using simple undelete utilities such as Restoration.

However, there are utilities too that able to anti-undelete data deleted from hard disk! Anti-undelete utilities such as SDelete and Sure Delete will overwrite the sensitive data at least one time (or more than one times for more security in mind) with arbitrary bits or zero bits as Zero Fill does!

SDelete is a command line utility which is easy to use yet secure than Windows built-in del DOS command or Windows native delete function! To make it easy to use,

  1. Click on Start button,
  2. Click on Run menu,
  3. Type cmd in the Open field and click OK to call up Command Prompt window,
  4. Type echo %PATH% at the command prompt and press ENTER to output a list of default program paths separated with semi-colon.
    The default program path is used by Windows Run menu and Command Prompt to automatically locate a file or program. For example, the Run menu automatically locate cmd.exe and execute it, after typing cmd followed by pressing ENTER in previous step shown. If the cmd.exe is not reside in default program path, the Run menu will not able locate and execute it automatically.
  5. Put the Sdelete.exe to the any one of the folder path listed in echo %PATH% output, preferable is to use the system folder (e.g. C:\Windows\System32 in a default Windows XP setup),
  6. Add a MS-DOS Command Prompt shortcut with customized option switch to Context Menu (if the shortcut is not there).

    After this step, using command line utilities will becomes easier. Just right-click on any folder and click on the MS-DOS Command Prompt shortcut added to Context Menu, the MS-DOS Command Prompt will opens and automatically pointing to the complete folder path of which the folder being right-clicked. Now what? Just type sdelete SensitiveFile.dat to delete a file called SensitiveFile.dat resides in that particular folder - hassle free!
Related information:
  • SDelete command line utility used to delete sensitive data securely
  • Sure Delete Window GUI utility used to delete sensitive data securely
  • Create File is one of Windows 2000 Resource kit (creatfil.exe) used to generate empty file of arbitrary size up to 4GB (when running on Windows XP). Use it to create as many empty file as possible to fill up all the empty space reported by Windows will able to wipe off deleted file data that reside at these free disk space.
  • WipeFree command line utility used to generate dump file to fill up free disk space where the deleted file reside. It is better than creatfil.exe as it doesn't limited to 4GB file size. Although, its speed is lower than creatfil.exe does.
  • What happen to a file when deleted from Windows
  • Undelete files from an emptied Recycled Bin with Restoration
  • Enable MS-DOS faster change path and auto-complete filename
  • Search more related info with Google Search engine built-in